US8582476B2 - Communication relay device and communication relay method - Google Patents
Communication relay device and communication relay method Download PDFInfo
- Publication number
- US8582476B2 US8582476B2 US13/071,503 US201113071503A US8582476B2 US 8582476 B2 US8582476 B2 US 8582476B2 US 201113071503 A US201113071503 A US 201113071503A US 8582476 B2 US8582476 B2 US 8582476B2
- Authority
- US
- United States
- Prior art keywords
- connection determination
- permissible
- section
- user
- permit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the present invention relates to a communication relay device and a communication relay method.
- access points are utilized which wirelessly communicate with wireless communication devices to connect the wireless communication devices to the network.
- the access points determine, when a wireless communication device is to be connected to a network, whether the connection can be permitted. For such determination, various methods are employed. For example, a method using an address which is unique to individual wireless communication devices (e.g., so called MAC address: Media Access Control address) is employed.
- a method using a common key (password) which is preliminarily registered to an access point and its corresponding wireless communication device e.g., Wi-Fi Protected Access—pre-shared key (WPA-PSK), and WPA2-PSK
- WPA-PSK Wi-Fi Protected Access—pre-shared key
- WPA2-PSK Wi-Fi Protected Access—pre-shared key
- WPA2-EAP Extensible Authentication Protocol
- An access point performs the determination based on a predetermined method. If the access point obtains a positive determination result from the determination using the method, the access point connects a wireless communication device to the network. If the access point does not obtain a positive determination result, the access point does not connect the wireless communication device to the network. Thus, if the access point cannot obtain a positive determination result for some reasons, the access point does not permit connection between the wireless communication device and the network even if the wireless communication device is a device owned by an authorized user. Examples of such reasons include, for example, communication failure in a communication route between the access point and the authentication server, and an incorrect setting by the user. For various reasons like these, there has been a possibility of impairing authorized users' convenience.
- An object of the present invention is to solve one or more of the above-described problems, and to provide a technique of reducing the possibility of impairing the authorized users' convenience.
- a relay device includes: a wireless interface for wireless communication with one or more wireless communication devices; a communication interface for connection with a communication line for communication with a communication device which is different from the one or more wireless communication devices; a permissible connection determination section for applying a plurality of methods of permissible connection determination of whether relay of communication between the one or more wireless communication devices and the different communication device is permissible, and for permitting the relay of communication when a positive determination result is obtained, by least one of the methods; and a relay execution section for executing the relay of communication when the permissible connection determination section permits the relay.
- the relay device can permit the relay when it obtains a positive determination result from another permissible connection determination method. Thus, it is possible to reduce the possibility of impairing the authorized user's convenience.
- the permissible connection determination section may apply the plurality of methods for the permissible connection determination methods in a preliminarily determined order, or may apply the plurality of methods for the permissible connection determination method in a descending order of security.
- the permissible connection determination section applies the plurality of permissible connection determination methods in a descending order of security.
- the permissible connection determination section applies the plurality of permissible connection determination methods in a descending order of security.
- the relay device may include an application order allocation section for allocate an application order in which the plurality of methods of permissible connection determination are applied in accordance with an instruction by a user.
- the permissible connection determination section may apply the plurality of methods of permissible connection determination in the application order allocated by the application order allocation section.
- the permissible connection determination section applies the plurality of permissible connection determination methods in accordance with the application order allocated in accordance with the instruction by the user.
- the permissible connection determination section applies the plurality of permissible connection determination methods in accordance with the application order allocated in accordance with the instruction by the user.
- the relay device may include an identifier obtaining section configured to receive from one of the wireless communication devices which transmits a request for the relay a user identifier which identifies a user of the wireless communication device.
- the application order allocation section may allocate, in accordance with the instruction by the user, the application order in which the plurality of methods of permissible connection determination are applied and associates the user identifier with the application order, and the permissible connection determination section may apply the plurality of methods of permissible connection determination in the application order which is associated with the user identifier obtained by the identifier obtaining section.
- the application order allocation section allocates the application order and associates the application order with the user identifier, and the permissible connection determination section applies the plurality of permissible connection determination methods in accordance with the application order associated with the user identifier.
- the relay device can perform permissible connection determination suitable to the requests of the respective users.
- the relay device may include an identifier obtaining section configured to receive, from one of the wireless communication devices which transmits a request for relay, a user identifier identifying the user of each wireless communication device; and an individual application order allocation section for allocating the application order in which the plurality of methods of permissible connection determination are applied, and associating the user identifier with the application order.
- the permissible connection determination section may apply the plurality of methods of permissible connection determination in the application order which is associated with the obtained user identifier, and the individual application order allocation section may reflect, in the application order, which of the plurality of methods of permissible connection determination has provided a positive determination result, and applies the reflected application order at the subsequent permissible connection determination.
- the individual application order allocation section reflects, in the application order, which one of the permissible connection determination methods has provided a positive determination result.
- the relay device may include an application order output section for outputting information, which indicates the application order allocated to the plurality of methods of permissible connection determination, to the outside of the relay device so as to provide the information to a second relay device according to claim 1 ; and an application order obtaining section configured to receive, from the outside of the relay device, information indicating an application order allocated by the second relay device.
- the permissible connection determination section may apply the plurality of methods of permissible connection determination in the application order obtained by the application order obtaining section.
- any of the plurality of relay devices can provide the same convenience to the user.
- a method for relaying communication which includes the steps of: applying a plurality of methods of permissible connection determination of whether relay of communication between one or more wireless communication devices and a communication device which is different from the wireless communication devices is permissible by, and permitting the relay of communication, when a positive determination result is obtained by at least one of the methods; and executing the relay of communication when the relay is permitted by the permissible connection determination step.
- a nontransitory storage medium having stored therein a program for causing a computer to execute a process of relaying communication, the program causing the computer to execute the functions of: applying a plurality of methods of permissible connection determination of whether relay of communication between one or more wireless communication devices and a communication device which is different from the wireless communication devices is permissible, and permitting the relay of communication when a positive determination result is obtained by at least one of the methods; and executing the relay of communication when the relay is permitted by the permissible connection determination.
- the present invention can be realized by various modes.
- the present invention can be realized by a communication relay method, a communication relay device, a network system including the communication relay device, a computer program for realizing the method or the functions of the devices, a storage medium having stored therein the computer program, and the like.
- FIG. 1 is a diagram illustrating a network system 1000 according to a first embodiment of the present invention
- FIG. 2 is a block diagram illustrating a configuration of a relay device 100 according to the first embodiment
- FIG. 3A is a diagram illustrating an example of permissible determination method list data 310 illustrated in FIG. 2 ;
- FIG. 3B is a diagram illustrating another example of the permissible determination method list data 310 illustrated in FIG. 2 ;
- FIG. 3C is a diagram illustrating still another example of the permissible determination method list data 310 illustrated in FIG. 2 ;
- FIG. 4 is a flowchart showing a procedure of permissible connection determination according to the first embodiment
- FIG. 5 is a flowchart showing another procedure of the permissible connection determination according to the first embodiment
- FIG. 6 is an explanatory diagram illustrating an example of a setting screen shown on a display of a client device 702 according to the first embodiment
- FIG. 7 is a block diagram illustrating a configuration of a relay device according to a second embodiment of the present invention.
- FIG. 8 is a block diagram illustrating a configuration of a relay device according to a third embodiment of the present invention.
- FIG. 9 is a block diagram illustrating a configuration of a relay device according to a fourth embodiment of the present invention.
- FIG. 10 is an explanatory diagram illustrating a network system 1002 including a relay device according to a fifth embodiment of the present invention.
- FIG. 1 is a diagram illustrating a network system 1000 according to a first embodiment of the present invention.
- the network system 1000 includes a relay device 100 , a network 800 connected to the relay device 100 via a port P, an authentication server 802 connected to the network 800 , and client devices 702 and 704 wirelessly connected to the relay device 100 .
- the relay device 100 and the client devices 702 and 704 are wireless Local Area Network (LAN) communication devices which are compliant with the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard.
- LAN Local Area Network
- the network 800 is an internal network structured within a limited range (for example, a LAN such as an intra-office network, and a Wide Area Network (WAN) network such as a network of an Internet service provider which provides Internet connection).
- the network 800 is connected to the Internet (not illustrated).
- the relay device 100 is a so-called access point (access point of a wireless LAN).
- the relay device 100 utilizes a wireless network 700 which is compliant with the IEEE802.11 standard to wirelessly communicate with the client devices 702 and 704 , establishes a connection between the client devices 702 and 704 and the network 800 , and thereby enables communication between various other communication devices which are connected to the network 800 (e.g., a Web server, a mail server, or a personal computer, which are not illustrated) and the client devices 702 and 704 .
- Any communication devices that can perform wireless communication are adoptable as the client devices 702 and 704 (in this embodiment, the client devices 702 and 704 are personal computers).
- the type of the communication device connected to the wireless network 700 is not limited to a computer, but any type of device (e.g., home electrical appliances such as televisions, video cameras, and video recorders) is adoptable.
- the authentication server 802 is a so-called Remote Authentication Dial In User Service (RADIUS) server.
- the authentication server 802 is used to determine whether connection by a wireless communication device to the network via the relay device 100 (communication relay) is permissible (hereinafter this determination is also referred to as “authentication or permissible connection determination”).
- the authentication server 802 includes a first authentication process section 802 a and a second authentication process section 802 b .
- the first authentication process section 802 a performs authentication using a MAC address (also referred to as “MAC-RADIUS authentication”).
- the MAC address corresponds to a layer 2 address.
- Layer 2 corresponds to the second layer (data link layer) of a so-called Open Systems Interconnection (OSI) reference model.
- the second authentication process section 802 b performs WPA2-EAP authentication (i.e., Wi-Fi Protected Access 2—Extensible Authentication Protocol, compliant with IEEE802.11 i).
- the relay device 100 performs permissible connection determination in response to a request from a wireless communication device (e.g., the client device 702 , hereinafter simply referred to as “communication device”). If the relay device 100 inquires the first authentication process section 802 a about a determination result, the relay device 100 obtains the determination result based on the MAC-RADIUS method. If the relay device 100 inquires the second authentication process section 802 b about a determination result, the relay device 100 obtains the determination result based on the WPA2-EAP method. Alternatively, the relay device 100 itself can perform permissible connection determination without inquiring the authentication server 802 . In such a case, the WPA-PSK (pre-shared key) method or the WPA2-PSK method, for example, is adoptable as the determination method. In this manner, the relay device 100 can employ a plurality of permissible connection determination methods.
- a wireless communication device e.g., the client device 702 , hereinafter simply referred to as “communication device”. If
- the relay device 100 connects the communication device (e.g., the client device 702 ) to the network 800 . Accordingly, the client device 702 becomes able to perform communication with various communication devices via the network 800 .
- FIG. 2 is a block diagram illustrating a configuration of the relay device 100 .
- the relay device 100 includes a wireless interface 500 for wireless communication, a communication interface 510 for wired communication, a user interface 400 , a control section 200 for controlling the relay device 100 , and a nonvolatile memory 300 for storing various pieces of information.
- the user interface 400 allows a user to directly perform settings of the relay device 100 , and includes an operation section (e.g., switches and buttons), and a display section (e.g., lamp and liquid crystal display).
- the settings performed by the user are stored in the nonvolatile memory 300 .
- the nonvolatile memory 300 is a writable memory.
- the nonvolatile memory 300 stores programs of settings used for operation of the relay device 100 , firmware programs, and the like.
- a flash memory is adopted as the nonvolatile memory 300 .
- the nonvolatile memory 300 stores permissible determination method list data 310 , setting information 320 , and a program 302 .
- the wireless interface 500 performs communication using the wireless network 700 compliant with the IEEE802.11. Any of IEEE802.11 a, b, g, and n may be adopted as the standard of the wireless network 700 . Alternatively, standards other than the IEEE802.11 may be adopted.
- the communication interface 510 is used for connection with a communication line compliant with the IEEE802.3.
- the communication interface 510 has a port P, and the communication interface 510 is connected to the network 800 via the port P.
- the number of ports arranged in the communication interface 510 may be two or more.
- a standard other than the IEEE802.3 may alternatively be adopted as the standard of the communication network.
- PLC power line carrier communication
- an interface for wireless communication may be adopted instead of the wired communication interface.
- the control section 200 is a computer including a Central Processing Unit (CPU) 202 and a memory 204 (e.g., Dynamic Random Access Memory (DRAM)), and controls respective components of the relay device 100 .
- the CPU 202 executes the program 302 stored in the nonvolatile memory 300 , and thereby executes functions of various process sections including a relay execution section 210 , a permissible connection determination section 220 , and a wireless network control section 230 .
- execution of a function of a certain process section by the CPU in accordance with the program is also referred to as execution of the process by the certain process section.
- the wireless network control section 230 controls the wireless interface 500 to establish the wireless network 700 using wireless communication.
- the wireless network control section 230 sets a so-called Service Set Identifier (SSID), and performs communication with a communication device that has the same SSID value.
- SSID Service Set Identifier
- the wireless network 700 can be identified using the SSID.
- the relay execution section 210 relays communication between communication devices (e.g., the client device 702 , or other relay devices not illustrated) which are connected to the communication interfaces (wireless interface 500 and communication interface 510 ).
- the relay execution section 210 performs a so-called routing function (function of routers or layer 3 switches) to relay communication.
- Information e.g., route information, also referred to as a routing table
- the relay execution section 210 may perform other functions (e.g., a so-called bridging function (layer 2 switch function)) for communication relay in addition to, or instead of, the routing function.
- the relay execution section 210 may operate as a mere repeater.
- the layer 3 corresponds to the third layer (network layer) in the OSI reference model.
- Both of the wireless interface 500 and the communication interface 510 correspond to communication route interfaces for establishing a connection with a plurality of communication routes. For example, the wireless interface 500 establishes a communication route leading to the client device 702 , and the communication interface 510 establishes a communication route leading to the network 800 .
- the permissible connection determination section 220 performs permissible connection determination. Details of the permissible connection determination performed by the permissible connection determination section 220 will be described later. As described above, the permissible connection determination section 220 can perform permissible connection determination using the authentication server 802 ( FIG. 1 ), and also perform permissible connection determination by itself without using the authentication server 802 . In this embodiment, the permissible connection determination section 220 performs permissible connection determination by applying a plurality of permissible connection determination methods in a predetermined application order. The application order is determined based on the permissible determination method list data 310 preliminarily stored in the nonvolatile memory 300 .
- FIG. 3A to FIG. 3C are diagrams illustrating three examples of the permissible determination method list data 310 ( FIG. 2 ).
- the permissible determination method list data 310 in FIG. 3A (hereinafter, also referred to as first example permissible determination method list data 310 A), and the permissible determination method list data 310 in FIG. 3B (hereinafter, also referred to as second example permissible determination method list data 310 B) are each list data prepared so that two determination methods are able to be applied.
- the permissible determination method list data 310 in FIG. 3C (hereinafter, also referred to as third example permissible determination method list data 310 C) is list data prepared so that three determination methods are able to be applied.
- the parenthesized numerals, e.g., (1), (2), (3), indicate the application order in which the permissible connection determination methods are applied.
- the “WPA2-EAP method” is applied first and the “MAC-RADIUS method” is applied second.
- the “WPA-PSK method” is applied first, and the “MAC-RADIUS method” is applied second.
- the “WPA2-EAP method” is applied first, and the “WPA-PSK method” is applied second, and the “MAC-RADIUS method” is applied third.
- the nonvolatile memory 300 of the relay device 100 preliminarily stores the permissible determination method list data 310 .
- the permissible connection determination section 220 applies the WPA2-EAP method, it relays certain data between the communication device and the authentication server 802 (hereinafter, description will be given based on the assumption that the client device 702 is used as the communication device).
- the data relayed includes, for example, user identifiers used for user identification, certification data, and so-called “challenge and response”.
- the client device 702 includes an information transmitting section 702 s , and the information transmitting section 702 s transmits information used for authentication (e.g., user identifier UID and certification data AD) to the authentication server 802 via the relay device 100 .
- the information transmitting section 702 s is also referred to as a “supplicant”.
- the authentication server 802 determines, based on an authentication process using the received data (information), whether to permit connection of the client device 702 to the network (communication relay), and provides the determination result to the relay device 100 .
- EAP e.g., an EAP-TLS (Transport Layer Security), an EAP-TTLS (Tunneled TLS), an EAP-PEAP (Protected EAP)
- EAP EAP-TLS (Transport Layer Security)
- EAP-TTLS Transmission Layer Security
- EAP-PEAP Protected EAP
- the permissible connection determination section 220 applies the MAC-RADIUS method, it obtains the MAC address of the client device 702 (communication device) from a packet (also referred to as a frame) received from the communication device, and transmits the obtained MAC address to the authentication server 802 .
- the authentication server 802 (first authentication process section 802 a ( FIG. 1 )) then refers to a preliminarily set MAC address list (list of MAC addresses of communication devices to which connections are permitted) to determine if the received MAC address is among those on the MAC address list. If the received MAC address is found on the MAC address list, then the first authentication process section 802 a provides a positive determination result to the relay device 100 .
- the first authentication process section 802 a provides a negative determination result to the relay device 100 .
- the client device 702 does not need to include the information transmitting section 702 s.
- the permissible connection determination section 220 applies the WPA-PSK method (or WPA2-PSK method), it performs permissible connection determination using a pre-shared key PSK 1 preliminarily stored in the nonvolatile memory 300 .
- the information transmitting section 702 s of the client device 702 also has a preliminarily set pre-shared key PSK 2 for purposes of permissible connection determination.
- the permissible connection determination section 220 transmits/receives various data to/from the client device 702 , and specifies whether the pre-shared key PSK 2 of the client device 702 coincides with the pre-shared key PSK 1 of the relay device 100 . If they coincide with each other, the permissible connection determination section 220 obtains a positive determination result. If they do not coincide with each other, the permissible connection determination section 220 obtains a negative determination result.
- FIG. 4 is a flowchart showing a permissible connection determination procedure according to this embodiment. If two permissible connection determination methods are in the permissible determination method list data 310 ( FIG. 2 , FIG. 3 ), the permissible connection determination section 220 ( FIG. 2 ) performs permissible connection determination in accordance with the flowchart shown in FIG. 4 .
- the permissible connection determination section 220 starts a determination process in response to a connection request from a communication device (e.g., the client device 702 ).
- step S 10 i.e., the first step, the permissible connection determination section 220 obtains a provisional determination result by applying the first permissible connection determination method, i.e., first-in-order permissible connection determination method, of the permissible determination method list data 310 .
- the permissible determination method list data 310 is the first example permissible determination method list data 310 A ( FIG. 3A )
- the permissible connection determination section 220 applies the first-in-order permissible connection determination method of the first example permissible determination method list data 310 A, which is the “WPA2-EAP method”.
- the permissible determination method list data 310 is the second example permissible determination method list data 310 B ( FIG.
- the permissible connection determination section 220 applies the first-in-order permissible connection determination method of the first example permissible determination method list data 310 B, which is the “WPA-PSK method”. If the obtained provisional determination result is positive, the permissible connection determination section 220 permits connection (relay) without applying the other (remaining) permissible connection determination method (step S 40 ). In this case, in subsequent step S 42 , the relay execution section 210 connects the communication device to the network to relay communication therebetween.
- the wireless network control section 230 encrypts wireless communication in accordance with the permissible connection determination method which has provided the positive determination result. For example, if the “WPA2-EAP method” has provided the positive determination result, the wireless network control section 230 encrypts communication in accordance with the “WPA2-EAP method”.
- the permissible connection determination section 220 obtains, in subsequent step S 20 , a provisional determination result by applying the second permissible connection determination method, i.e., second-in-order permissible connection determination method of the permissible determination method list data 310 .
- the permissible determination method list data 310 is the first example permissible determination method list data 310 A ( FIG. 3A )
- the permissible connection determination section 220 applies the second-in-order permissible connection determination method of the permissible determination method list data 310 A, which is the “MAC-RADIUS method”.
- the permissible determination method list data 310 is the second example permissible determination method list data 310 B ( FIG.
- the permissible connection determination section 220 applies the second-in-order permissible connection determination method of the permissible determination method list data 310 B, which is the “MAC-RADIUS method”. If the obtained provisional determination result is positive, the permissible connection determination section 220 permits the connection (relay) (step S 40 ). In this case, in subsequent step S 42 , the relay execution section 210 connects the communication device to the network to relay communication therebetween. On the other hand, if the provisional determination result is negative, the permissible connection determination section 220 rejects the connection (relay) (step S 50 ). In this case, the relay execution section 210 neither connects the communication device to the network, nor relays communication by the communication device.
- the permissible connection determination section 220 of the relay device 100 obtains a positive determination result from at least one of a plurality of permissible connection determination methods defined in the permissible determination method list data 310 , it permits connection (relay) based on the permissible connection determination method from which the positive determination result is obtained.
- the permissible connection determination section 220 permits the connection (relay). Accordingly, it is possible to reduce the possibility of impairing the authorized users' convenience.
- the permissible connection determination section 220 performs the permissible connection determination based on the first example permissible determination method list data 310 A or the second example permissible determination method list data 310 B, the connection may be permitted, for example, based on the second-in-order permissible connection determination method of the respective example permissible determination method list data 310 A or 310 B. In this manner, it is possible to reduce the possibility of impairing the authorized users' convenience.
- FIG. 5 is a flowchart showing another permissible connection determination procedure according to this embodiment.
- the permissible connection determination section 220 ( FIG. 2 ) performs permissible connection determination in accordance with the flowchart shown in FIG. 5 in the case where three permissible connection determination methods are in the permissible determination method list data 310 ( FIG. 2 , FIG. 3 ) (e.g., in the case where the permissible determination method list data 310 is the third example permissible determination method list data 310 C ( FIG. 3C ).
- the flowchart in FIG. 5 is different from that in FIG. 4 in that the flowchart in FIG.
- step S 30 where the third permissible connection determination method, i.e., third-in-order permissible connection determination method, is applied.
- the other steps S 10 , S 20 , S 40 , S 42 , and S 50 are the same as those steps in FIG. 4 having the same reference numerals, respectively.
- the permissible connection determination section 220 performs step S 30 if the provisional determination result obtained in step S 20 is negative.
- step S 30 the permissible connection determination section 220 obtains a provisional determination result by applying the third-in-order permissible connection determination method of the permissible determination method list data 310 . If the permissible determination method list data 310 is the third example permissible determination method list data 310 C ( FIG. 3C ), the permissible connection determination section 220 applies the “WPA2-EAP method”, “WPA-PSK method”, and “MAC-RADIUS method” in steps S 10 , S 20 , and S 30 , respectively.
- the permissible connection determination section 220 rejects the connection (relay) (step S 50 ). If a positive determination result is obtained from one of the methods, the permissible connection determination section 220 permits the connection (relay) (step S 40 ).
- the total number of the permissible connection determination methods applicable may alternatively be four or more.
- the permissible connection determination section 220 applies the plurality of permissible connection determination methods in a predetermined application order. If a positive determination result is obtained from one of the plurality of permissible connection determination methods, the permissible connection determination section 220 permits the connection (relay). Accordingly, it is possible to further reduce the possibility of impairing the authorized users' convenience.
- the permissible connection determination section 220 applies a plurality of permissible connection determination methods in a predetermined application order, and when the permissible connection determination section 220 has obtained a positive determination result, it ends the permissible connection determination without applying the remaining permissible connection determination methods ( FIGS. 4 and 5 ). Therefore, the permissible connection determination section 220 can perform high-speed permissible connection determination as compared to a case where all the permissible connection determination methods are applied to obtain determination results.
- permissible connection determination may be continued notwithstanding that a positive determination result is obtained.
- the permissible connection determination section 220 permits connection (relay) if a positive determination result is obtained from one or a multiple number of the plurality of permissible connection determination methods.
- the security level (i.e., difficulty in succeeding in unauthorized connection) may vary depending on the permissible connection determination methods.
- a permissible connection determination method which uses dynamically generated values e.g., random number generated each time permissible connection determination is performed
- a permissible connection determination method which uses static values e.g., preliminarily set passwords.
- the WPA2-EAP method has a higher security level than the MAC-RADIUS method.
- the security level of the permissible connection determination method can be high.
- the WPA2-EAP method has a higher security level than the WPA-PSK method
- the WPA-PSK method has a higher security level than the MAC-RADIUS method.
- a common communication device e.g., a personal computer
- a common communication device can be used thereby to compare the time required for the respective permissible connection determination methods to complete brute-force attempts.
- the predetermined application order is set such that the permissible connection determination section 220 applies the plurality of permissible connection determination methods in a descending order of security level. Accordingly, it is possible to avoid unnecessary application of the permissible connection determination method having a low security level. For example, in the example shown in FIG. 3A , if the permissible connection determination section 220 ( FIG. 2 ) can obtain a positive determination result by applying the WPA2-EAP method, it does not apply the MAC-RADIUS method. In this manner, the predetermined application order is set such that the permissible connection determination section 220 preferentially applies the permissible connection determination method having a higher security level.
- the wireless network control section 230 ( FIG. 2 ) encrypts wireless communication in accordance with the permissible connection determination method which has provided a positive determination result (step S 42 , FIGS. 4 and 5 ).
- the higher security level the permissible connection determination method has the more the encryption strength of the communication, which depends on the permissible connection determination methods, increases.
- the permissible connection determination section 220 preferentially applies the permissible connection determination method having a higher security level, the encryption strength for wireless communication can be increased.
- the predetermined application order is set such that the permissible connection determination section 220 applies a plurality of permissible connection determination methods in a descending order of their encryption strengths for wireless communication.
- the wireless network control section 230 applies a method (algorithm) which is preliminarily associated with the permissible connection determination method which has provided a positive determination result.
- the wireless network control section 230 applies an encryption method preliminarily selected by the user from among a plurality of predetermined encryption methods.
- the user may select an encryption method for each permissible connection determination method.
- the encryption methods selectable may change depending on the permissible connection determination methods. For example, for the “WPA2-EAP method”, a Temporal Key Integrity Protocol (TKIP) and an Advanced Encryption Standard (AES) are selectable.
- TKIP Temporal Key Integrity Protocol
- AES Advanced Encryption Standard
- the wireless network control section 230 may apply a predetermined encryption method rather than the method selected by the user.
- setting of the encryption method is stored in the nonvolatile memory 300 (e.g., the setting information 320 ).
- the encryption strength varies depending on the encryption methods used. For example, the encryption strength of the communication encryption method which uses dynamically generated values (e.g., values generated at start of communication, or random numbers generated during communication) is higher than that of the communication encryption method which uses only static values (e.g., preliminarily set passwords). Generally, if an encryption method requires a longer time before improper communication decryption can be established as by requiring changing all possible combinations of data (e.g., encryption keys) required for decryption of the encrypted communication, i.e., by using the brute-force method, the encryption strength of the encryption method is considered to be higher.
- dynamically generated values e.g., values generated at start of communication, or random numbers generated during communication
- static values e.g., preliminarily set passwords
- the permissible connection determination section 220 applies a plurality of permissible connection determination methods in a descending order of encryption strengths for wireless communication.
- the encryption strength of the WPA2-EAP method is higher than that of the WPA-PSK method
- the encryption strength of the WPA-PSK method is higher than that of the MAC-RADIUS method.
- Data provided for permissible connection determination to the relay device 100 by the communication device depends on the permissible connection determination methods. For example, data required for the “WPA2-EAP method” is different form data required for the “WPA-PSK method”.
- the communication device preferably provides the relay device 100 with the data required for a respective permissible connection determination in the same order as the application order of the permissible connection determination methods set in the relay device 100 .
- the permissible determination method list data 310 of the relay device 100 is the third example permissible determination method list data 310 C ( FIG. 3C )
- the communication device preferably provides data as follows. That is, the communication device provides the relay device 100 with data required for the WPA2-EAP method. If the connection is not permitted, the communication device provides the relay device 100 with data required for the WPA-PSK method.
- FIG. 6 is an explanatory diagram illustrating an example of a setting screen shown on a display of the client device 702 .
- the setting screen is used to control operation of the information transmitting section 702 s .
- the user operates the client device 702 while viewing the setting screen illustrated in FIG. 6 , thereby setting wireless communication including the profile name, SSID (Service Set Identifier), and security method.
- SSID Service Set Identifier
- the information transmitting section 702 s manages the settings for wireless communication as a profile.
- the profile name is a name used for specifying the profile.
- the SSID is an identifier for identification of the wireless network 700 ( FIGS. 1 and 2 ).
- this setting item indicates a so-called Extended Service Set Identifier (ESSID).
- ESSID Extended Service Set Identifier
- BSSID Basic Service Set Identifier
- the security method represents the permissible connection determination method.
- the user can set a plurality of methods.
- the user can specify the application order of the methods.
- FIG. 1 the example illustrated in FIG.
- the “WPA2-EAP method” and “WPA-PSK method” are registered, and the “WPA2-EAP method” is set as the first-in-order permissible connection determination method of the application order, and the “WPA-PSK method” is set as the second-in-order permissible connection determination method of the application order.
- the user performs such setting based on the third example permissible determination method list data 310 C shown in FIG. 3C .
- the information transmitting section 702 s transmits a request for the permissible connection determination to the relay device 100 in accordance with the set profile.
- the information transmitting section 702 s first provides the relay device 100 ( FIG. 2 ) with data required for the “WPA2-EAP method”. If the connection is not permitted, the information transmitting section 702 s provides the relay device 100 with data required for the “WPA-PSK method”.
- the information transmitting section 702 s of the client device 702 is preferably configured to provide the relay device 100 with the data required for a respective permissible connection determination method in accordance with the application order of the permissible connection determination methods set in the relay device 100 .
- the configuration of the communication device e.g., client device 702 for setting the application order of the plurality of the permissible connection determination methods is not limited to the configuration illustrated in FIG. 6 . Any other configuration may be adopted.
- a profile may be set to correspond to each permissible connection determination method.
- the user may set a plurality of profiles which corresponds to different permissible connection determination methods, respectively, and then set the application order of the profiles.
- FIG. 7 is a block diagram illustrating a relay device 100 A according to a second embodiment of the present invention.
- the hardware configuration of the relay device 100 A according to the second embodiment is the same as that of the relay device 100 according to the first embodiment illustrated in FIG. 2 .
- those components of the relay device 100 A which are the same as those of the relay device 100 are denoted by the same reference numerals, respectively, and different components will be mainly described.
- FIG. 7 illustrates only a part of the configuration of the relay device 100 A.
- the relay execution section 210 and the wireless network control section 230 are not illustrated, and among the data stored in the nonvolatile memory 300 , the setting information 320 and the program (control program corresponding to the program 302 ) are not illustrated. It should be noted that the relay device 100 A may be used instead of the relay device 100 according to the first embodiment.
- the CPU 202 operates as an application order allocation section 240 , in addition to the relay execution section 210 (not illustrated), a permissible connection determination section 220 A, and the wireless network control section 230 (not illustrated).
- the process performed by the permissible connection determination section 220 A according to this embodiment is slightly different from the process performed by the permissible connection determination section 220 according to the first embodiment illustrated in FIG. 2 (details to be described later).
- the application order allocation section 240 allocates the application order to the plurality of permissible connection determination methods in accordance with the user's instruction.
- an application order setting screen SS is shown.
- the application order allocation section 240 displays on the display section (not illustrated) of the user interface 400 the application order setting screen SS (step S 100 ).
- the user can select the permissible connection determination methods (security method) used for permissible connection determination. Then the user can allocate the application order to the selected permissible connection determination methods.
- the user selects the “WPA-PSK method” and the “MAC-RADIUS method”, and allocates the “WPA-PSK method” as the first-in-order permissible connection determination method of the application order, and the “MAC-RADIUS method” as the second-in-order permissible connection determination method of the application order.
- the user can arbitrarily select one or more permissible connection determination methods from among a preliminarily prepared plurality of permissible connection determination methods. For example, the user can select other methods (e.g., “WPA2-EAP method”).
- the application order allocation section 240 obtains the setting details (step S 110 ).
- the application order allocation section 240 stores the obtained setting details in the nonvolatile memory 300 as the permissible determination method list data 310 (step S 120 ).
- the permissible connection determination section 220 A performs the permissible connection determination in the same manner as the permissible connection determination section 220 according to the first embodiment ( FIGS. 4 and 5 ).
- the permissible connection determination section 220 A applies the plurality of permissible connection determination methods in application order allocated by the application order allocation section 240 .
- the communication device e.g., client device 702
- the permissible connection determination section 220 A performs the permissible connection determination in accordance with the permissible determination method list data 310 (application order) set by the application order allocation section 240 (step S 130 ). Specifically, the permissible connection determination section 220 A performs the permissible connection determination in accordance with the flowchart shown in FIG. 4 . The permissible connection determination section 220 A determines whether the “WPA-PSK method” is permissible in step S 10 , and whether the “MAC-RADIUS method” is permissible in step S 20 , respectively.
- the application order allocation section 240 allocates the application order to the plurality of permissible connection determination methods in accordance with a selection by the user, and the permissible connection determination section 220 A applies the plurality of permissible connection determination methods in the application order allocated by the application order allocation section 240 thereby to perform the permissible connection determination. Accordingly, it is possible to avoid a case where a method which is not intended by the user is applied preferentially. For example, the user can carefully perform setting for a specific permissible connection determination method (e.g., WPA2-EAP method) with respect to the communication device (e.g., client device 702 ). In this case, the user allocates the permissible connection determination method as the first in the application order.
- a specific permissible connection determination method e.g., WPA2-EAP method
- the permissible connection determination method that is the first in order of the application order provides a positive determination result, and thus it is possible to reduce the possibility of increase in time required for obtaining the permissible connection determination result.
- the user may allocate as the first in the application order the permissible connection determination method (e.g., MAC-RADIUS method) which does not require any setting with respect to the communication device (e.g., client device 702 ). Accordingly, the user does not need to perform any setting for permissible connection determination with respect to the communication device, and thus it is possible to reduce the possibility of increase in time required for obtaining the permissible connection determination result.
- the permissible connection determination method e.g., MAC-RADIUS method
- the application order allocation section 240 may receive the user's instruction based on another method which does not use the user interface 400 .
- the application order allocation section 240 may display on a terminal, connected to the wireless interface 500 ( FIG. 2 ) or the communication interface 510 , a web page for setting, and perform the setting in accordance with an instruction inputted by the user through the web page.
- the application order allocation section 240 may perform the setting in accordance with an instruction inputted by the user through the terminal connected to a management port (not illustrated) provided in the relay device 100 A.
- the terminal connected to the wireless interface 500 ( FIG. 2 ) or the communication interface 510 may execute dedicated software for the setting.
- FIG. 8 is a block diagram illustrating a relay device 100 B according to a third embodiment of the present invention.
- the hardware configuration of the relay device 100 B according to the third embodiment is the same as that of the relay device 100 according to the first embodiment illustrated in FIG. 2 .
- those components of the relay device 100 B which are the same as those of the relay device 100 are denoted by the same reference numerals, respectively, and different components will be mainly described.
- FIG. 8 illustrates only a part of the configuration of the relay device 100 B.
- the relay execution section 210 and the wireless network control section 230 are not illustrated, and among the data stored in the nonvolatile memory 300 , the setting information 320 and the program (control program corresponding to the program 302 ) are not illustrated. It should be noted that the relay device 100 B may be used instead of the relay devices 100 and 100 A in the above respective embodiments.
- the CPU 202 operates as an individual application order allocation section 242 and a user ID obtaining section 250 in addition to the relay execution section 210 (not illustrated), a permissible connection determination section 220 B, and the wireless network control section 230 (not illustrated).
- the process performed by the permissible connection determination section 220 B according to this embodiment is slightly different from the process performed by the permissible connection determination section 220 according to the first embodiment and by the permissible connection determination section 220 A illustrated in FIG. 7 (details to be described later).
- the relay device 100 B allocates, in accordance with the user's instruction, the application order to the plurality of permissible connection determination methods.
- the relay device 100 B manages the correspondence relation between the permissible connection determination method and the application order for each user ID.
- the user ID obtaining section 250 obtains, from a communication device (e.g., client device 702 ) which requests a connection (relay), a user identifier identifying the user.
- the user ID obtaining section 250 may adopt, for example, the user identifier that is used in the WPA2-EAP method.
- the user ID obtaining section 250 analyzes data for the WPA2-EAP method provided by the communication device, and obtains the user identifier based on the analysis.
- the user ID obtaining section 250 may adopt as the user identifier the MAC address of the communication device.
- the user ID obtaining section 250 analyzes the header of a packet provided by the communication device, and obtains the user identifier based on the analysis.
- the individual application order allocation section 242 allocates the application order to the plurality of permissible connection determination methods in accordance with the user's instruction.
- the user provides the individual application order allocation section 242 with an instruction including the user identifier.
- steps S 200 to S 220 processes (step S 200 to S 220 ) of a case where the user identifier is “USER 1 ”, and processes (step S 300 to S 320 ) of a case where the user identifier is “USER 2 ” are described.
- the individual application order allocation section 242 displays on the display section (not illustrated) of the user interface 400 an application order setting screen SS 1 corresponding to the user identifier (step S 200 ).
- the user sets the “WPA-PSK method” as the first-in-order permissible connection determination method of the application order, and the “MAC-RADIUS method” as the second-in-order permissible connection determination method of the application order.
- the individual application order allocation section 242 obtains the setting details (step S 210 ).
- the individual application order allocation section 242 associates the obtained setting details with the user identifier (USER 1 ) to store the associated setting detail in the nonvolatile memory 300 (step S 220 : permissible determination method list data 311 ).
- steps S 300 , S 310 , and S 320 are the same as steps S 200 , S 210 , and S 220 , respectively.
- the user sets the “MAC-RADIUS method” as the first-in-order permissible connection determination of the application order, and sets the “WPA-PSK method” as the second permissible connection determination of the application order through an application order setting screen SS 2 for the other user identifier (USER 2 ).
- the permissible connection determination method to be used may vary depending on the user identifiers.
- the permissible connection determination section 220 B applies a plurality of permissible connection determination methods based on the application order allocated by the individual application order allocation section 242 .
- the permissible connection determination section 220 B obtains the user identifiers from the user ID obtaining section 250 , and performs the permissible connection determinations based on the permissible determination method list data which is associated with the obtained user identifiers.
- the user ID obtaining section 250 obtains the user identifier (USER 1 ) from the client device 702 , and provides the obtained user identifier to the permissible connection determination section 220 B (step S 230 ).
- the permissible connection determination section 220 B performs the permissible connection determination in accordance with the permissible determination method list data 311 (application order) which is associated with the obtained user identifier (USER 1 ) (step S 240 ).
- the permissible connection determination section 220 B performs the permissible connection determination in accordance with the permissible determination method list data 312 which is associated with the user identifier (USER 2 ) (steps S 330 and S 340 are the same as steps S 230 and S 240 , respectively).
- the individual application order allocation section 242 allocates the application order to the plurality of permissible connection determination methods while associating the application order with the user identifier. Then, the permissible connection determination section 220 B applies the plurality of permissible connection determination methods based on the application order which is associated with the user identifier, thereby to perform the permissible connection determination. Accordingly, even if the preferable application order varies depending on the users, the relay device 100 B can perform the permissible connection determination appropriately in response to the respective users' requests.
- the total number of the user identifiers manageable by the relay device 100 B may alternatively be three or more.
- the individual application order allocation section 242 selects, in accordance with the user's instruction, a plurality of permissible connection determination methods to be used, and allocates the application order to the selected plurality of permissible connection determination methods. Accordingly, even if preferable permissible connection determination methods differ depending on the users, the relay device 100 B can perform the permissible connection determination appropriately in response to the respective users' requests.
- the user interface 400 need not necessarily be used, but various methods may be adopted for the individual application order allocation section 242 to receive a user's instruction.
- FIG. 9 is a block diagram illustrating a relay device 100 C according to a fourth embodiment of the present invention.
- the hardware configuration of the relay device 100 C according to this embodiment is the same as that of the relay device 100 in FIG. 2 .
- those components of the relay device 100 C which are the same as those of the relay device 100 are denoted by the same reference numerals, respectively, and different components will be mainly described.
- FIG. 9 illustrates only a part of the configuration of the relay device 100 C.
- the relay execution section 210 and the wireless network control section 230 are not illustrated, and among the data stored in the nonvolatile memory 300 , the setting information 320 and the program (control program corresponding to the program 302 ) are not illustrated.
- the relay device 100 C may be used instead of the relay devices 100 , 100 A, and 100 B in the above respective embodiments.
- the CPU 202 in this embodiment operates as an individual application order allocation section 244 , and a user ID obtaining section 250 in addition to the relay execution section 210 (not illustrated), a permissible connection determination section 220 C, and the wireless network control section 230 (not illustrated).
- the process performed by the permissible connection determination section 220 C in this embodiment is slightly different from the process performed by the permissible connection determination section 220 in the first embodiment, the process performed by the permissible connection determination section 220 A in the second embodiment in FIG. 7 , and the process performed by the permissible connection determination section 220 B in the third embodiment in FIG. 8 (details to be described later).
- the relay device 100 C in this embodiment manages the correspondence relation between the permissible connection determination method and the application order for each user identifier. However, unlike in the third embodiment, the relay device 100 C in this embodiment updates the permissible determination method list data such that a higher priority in the application order is allocated to the permissible connection determination method that has provided a positive determination result.
- the user ID obtaining section 250 in this embodiment is the same as the user ID obtaining section 250 in the third embodiment.
- the user ID obtaining section 250 obtains user identifiers from communication devices.
- the individual application order allocation section 244 allocates the application order to the plurality permissible connection determination methods for each user ID. Specifically, the individual application order allocation section 244 updates the permissible determination method list data such that the permissible connection determination method which has provided a determination result is allocated with a higher priority in the application order. The individual application order allocation section 244 updates the permissible determination method list data while associating the data with the respective user identifiers.
- FIG. 9 illustrates a state where the individual application order allocation section 244 updates the permissible determination method list data 311 for the client device 702 (USER 1 ).
- the user ID obtaining section 250 obtains the user identifier (USER 1 in this case) from the client device 702 , and provides the obtained user identifier to the permissible connection determination section 220 C (step S 400 ).
- the permissible connection determination section 220 C performs the permissible connection determination in accordance with the permissible determination method list data 311 which is associated with the obtained user identifier (USER 1 ) (step S 410 ).
- the permissible determination method list data 311 a illustrated in the upper left of FIG. 9 is a determination method list 311 at that point of time.
- the “WPA-PSK method” is allocated as the first-in-order permissible connection determination method of the application order
- the “MAC-RADIUS method” is allocated as the second-in-order permissible connection determination method of the application order.
- the permissible connection determination section 220 C notifies the individual application order allocation section 244 that the permissible connection determination method that has provided a positive determination result is the “MAC-RADIUS method” (step S 420 ).
- the individual application order allocation section 244 updates the permissible determination method list data 311 such that the permissible connection determination method (i.e., MAC-RADIUS method, hereinafter also referred to as a “successful determination method”) is allocated as the first-in-order permissible connection determination method of the application order (step S 430 ).
- the individual application order allocation section 244 lowers a permissible connection determination method which is set higher in the application order than a successful determination method to a lower priority in the application order, and thereby updates the permissible determination method list data 311 .
- An updated permissible determination method list data 311 b is illustrated in the upper right of FIG. 9 .
- the “WPA-PSK method” is allocated as the second-in-order permissible connection determination method of the application order
- the “MAC-RADIUS method” is allocated as the first-in-order permissible connection determination method of the application order.
- the permissible connection determination section 220 C performs the permissible connection determination in accordance with the updated permissible determination method list data 311 b .
- the user will not update the setting of the client device 702 frequently.
- the permissible connection determination method which provides a positive determination result at the current permissible connection determination also provided a positive determination result at the previous permissible connection determination. Accordingly, if permissible connection determination section 220 C performs the permissible connection determination in accordance with the updated permissible determination method list data 311 b , it is possible to reduce the possibility of increase in time required for obtaining the permissible connection determination result.
- any method may be adopted as long as the method reflects, in the application order, which of the plurality of permissible connection determination methods has provided a positive determination result.
- the permissible connection determination section 220 A can apply the plurality of permissible connection determination methods in an order suitable to the wireless communication device used by the respective users.
- “to reflect, in the application order, which of the plurality of permissible connection determination methods has provided a positive determination result” means to perform an arbitrary process to allocate a higher priority in the application order to the permissible connection determination method that has provided a positive determination result.
- the individual application order allocation section 244 may allocate as the first-in-order permissible connection determination method of the application order the method that has provided a positive determination result.
- the individual application order allocation section 244 may allocate a higher priority in the application order to those methods which have provided a greater number of positive determination results.
- FIG. 10 is an explanatory diagram illustrating a network system 1002 including relay devices according to a fifth embodiment of the present invention.
- the network system 1002 includes a network 800 , two relay devices 100 D 1 and 100 D 2 which are connected to the network 800 , and a Lightweight Directory Access Protocol (LDAP) server 804 connected to the network 800 .
- LDAP Lightweight Directory Access Protocol
- the configuration of the second relay device 100 D 2 is the same as that of the first relay device 100 D 1 .
- the hardware configuration of the relay devices 100 D 1 and 100 D 2 is the same as that of the relay device 100 according to the first embodiment illustrated in FIG. 2 .
- those components of the relay devices 100 D 1 and 100 D 2 which are the same as those of the relay device 100 are denoted by the same reference numerals, respectively, and those components which are different from those in the first embodiment will be mainly described.
- FIG. 10 illustrates only a part of the configurations of the relay devices 100 D 1 and 100 D 2 .
- each CPU 202 the relay execution section 210 and the wireless network control section 230 are not illustrated, and among the data stored in the nonvolatile memory 300 , the setting information 320 and the program (control program corresponding to the program 302 ) are not illustrated.
- the relay devices 100 D 1 and 100 D 2 may be used instead of the relay devices 100 , 100 A, 100 B, and 100 C in the above respective embodiments.
- the CPU 202 in this embodiment realizes functions as an application order output section 260 and an application order obtaining section 262 , in addition to the functions as the process sections realized by the CPU 202 according to the fourth embodiment illustrated in FIG. 9 .
- the individual application order allocation section 244 updates the permissible determination method list data.
- the application order output section 260 of the relay device 100 D 1 transmits the updated determination method list to the LDAP server 804 .
- the application order obtaining section 262 of the relay device 100 D 2 obtains the updated determination method list from the LDAP server 804 , and stores the obtained permissible determination method list data in the nonvolatile memory 300 . Consequently, the relay devices 100 D 1 and 100 D 2 share the updated permissible determination method list data.
- FIG. 10 illustrates a state where the second relay device 100 D 2 obtains, via the LDAP server 804 , the determination method list 311 updated by the first relay device 100 D 1 .
- the first relay device 100 D 1 performs permissible connection determination in response to a connection request from the client device 702 , and updates the determination method list 311 (steps S 600 , S 610 , S 620 , and S 630 ).
- Steps S 600 , S 610 , S 620 , and S 630 are the same as steps S 400 , S 410 , S 420 , and S 430 , respectively in FIG. 9 .
- the application order output section 260 of the first relay device 100 D 1 transmits to the LDAP server 804 data representing the updated permissible determination method list data (permissible determination method list data 311 in this case) and the user identifier (USER 1 in this case) (step S 640 ).
- the LDAP server 804 is a computer which includes a data receiving section 804 a , a data storage section 804 b , and a data transmitting section 804 c .
- the data receiving section 804 a associates the determination method list received from the relay device 100 D 1 the user identifier and stores the determination method list associated with the user identifier USER 1 in the data storage section 804 b .
- the data transmitting section 804 c provides the relay device 100 D 1 with the determination method list which is associated with the user identifier USER 1 .
- the data storage section 804 b is a nonvolatile memory such as a hard disk drive, a flash memory, or the like. Alternatively, the data storage section 804 b may be a volatile memory (e.g., DRAM).
- the application order obtaining section 262 of the second relay device 100 D 2 obtains from the LDAP server 804 the permissible determination method list data 311 which is associated with the user identifier “USER 1 ” (step S 650 ).
- the data transmitting section 804 c of the LDAP server 804 transmits to the second relay device 100 D 2 (application order obtaining section 262 ) the permissible determination method list data (permissible determination method list data 311 in this case) which is associated with the user identifier USER 1 .
- the application order obtaining section 262 stores the obtained determination method list 311 in the nonvolatile memory 300 (step 660 ). In this state, if the second relay device 100 D 2 receives a connection request from the client device 702 , the second relay device 100 D 2 performs the permissible connection determination in accordance with the updated permissible determination method list data 311 .
- any of the plurality of relay devices can provide the users with the same convenience.
- the total number of relay devices which share the determination method list is not limited to two, but may be three or more.
- the plurality of relay devices share the permissible determination method list data set for individual user identifiers.
- the plurality of relay devices can perform permissible connection determination suitable for the individual users.
- the application order obtaining section 262 can obtain the determination method list at any time. For example, before the permissible connection determination section 220 C performs permissible connection determination, the application order obtaining section 262 may obtain from the LDAP server 804 the permissible determination method list data which is associated with the user identifier to be used for the permissible connection determination. Alternatively, the application order obtaining section 262 may obtain data from the LDAP server 804 at regular intervals.
- the application order output section 260 may output the permissible determination method list data at any time. For example, upon update of the permissible determination method list data, the application order output section 260 may output the updated permissible determination method list data. Alternatively, the application order output section 260 may output the permissible determination method list data upon reception of an instruction by the user.
- the server distributing the permissible determination method list data is not limited to the LDAP server 804 .
- any server may be adopted which includes: a receiving section for receiving information indicating the application order (e.g., permissible determination method list data) from a relay device; a storage section for storing the received information; and an outputting section for output the stored information to the relay device.
- the application order output section 260 of a certain relay device may directly transmit the updated determination method list to the application order obtaining section 262 of another relay device.
- the permissible connection determination methods are not limited to the above-described methods, but any arbitrary methods may be adopted.
- the WPA2-PSK method and WPA-EAP methods may be adopted.
- the relay device may have a configuration which is obtained by arbitrarily combining the configurations of the relay devices in the above respective embodiments.
- the relay device may have the configuration of the relay device 100 illustrated in FIGS. 2 and 3 and include the application order allocation section 240 illustrated in FIG. 7 .
- the permissible connection determination section 220 ( FIG. 2 ) may perform the permissible connection determination in accordance with the predetermined permissible determination method list data 310 as illustrated in FIG. 3 .
- the permissible connection determination section 220 may perform the permissible connection determination in accordance with the updated permissible determination method list data 310 in the same manner as the permissible connection determination section 220 A illustrated in FIG. 7 .
- the relay device may have the configuration of the relay device 100 illustrated in FIGS. 2 and 3 and include the individual application order allocation section 242 illustrated in FIG. 8 .
- the permissible connection determination section 220 ( FIG. 2 ) performs the permissible connection determination in accordance with the predetermined permissible determination method list data 310 as illustrated in FIG. 3 .
- the permissible connection determination section 220 performs the permissible connection determination in accordance with the associated permissible determination method list data, in the same manner as the permissible connection determination section 220 B according to the third embodiment illustrated in FIG. 8 .
- the relay device may have the configuration of the relay device 100 illustrated in FIGS. 2 and 3 and include the individual application order allocation section 242 illustrated in FIG. 8 and the individual application order allocation section 244 illustrated in FIG. 9 .
- the individual application order allocation section 242 ( FIG. 8 ) allocates the application order to the plurality of permissible connection determination methods for individual user identifiers in accordance with instructions by individual users as in the third embodiment illustrated in FIG. 8 .
- the individual application order allocation section 242 reflects, in the application order, which of the plurality of permissible connection determination methods has provided a positive determination result.
- the permissible connection determination section 220 ( FIG. 2 ) performs the permissible connection determination in accordance with the updated permissible determination method list data.
- the permissible connection determination section 220 performs the permissible connection determination in accordance with the predetermined permissible determination method list data as illustrated in FIG. 3 .
- the relay device may have the configuration of the relay device 100 B illustrated in FIG. 8 and include the individual application order allocation section 244 illustrated in FIG. 9 .
- the individual application order allocation section 242 ( FIG. 8 ) allocates the application order to the plurality of permissible connection determination methods for individual user identifiers in accordance with instructions by individual users.
- the permissible connection determination section 220 B performs permissible connection determination in accordance with the application order allocated by the individual application order allocation section 242 . Further, in the same manner as the individual application order allocation section 244 in the fourth embodiment illustrated in FIG.
- the individual application order allocation section 242 reflects, in the application order, which of the plurality of permissible connection determination methods has provided a positive determination result. Thereafter, in the same manner as the permissible connection determination section 220 C in the fourth embodiment illustrated in FIG. 9 , the permissible connection determination section 220 B performs permissible connection determination in accordance with the updated permissible determination method list data.
- the relay device may have the configuration of the relay device 100 A illustrated in FIG. 7 and include the application order output section 260 and the application order obtaining section 262 illustrated in FIG. 10 .
- the application order output section 260 transmits to the LDAP server 804 the updated permissible determination method list data.
- the permissible connection determination section 220 A ( FIG. 7 ) performs permissible connection determination in accordance with the permissible determination method list data updated by the application order allocation section 240 .
- the application order obtaining section 262 ( FIG.
- the permissible connection determination section 220 A ( FIG. 7 ) performs the permissible connection determination in accordance with the permissible determination method list data obtained by the application order obtaining section 262 .
- the permissible determination method list data shared by the relay devices are commonly used for all the user identifiers.
- the relay device may have the configuration of the relay device 100 B in the third embodiment illustrated in FIG. 8 and include the application order output section 260 and the application order obtaining section 262 in the fifth embodiment illustrated in FIG. 10 .
- the relay device may perform permissible connection determination in accordance with the predetermined application order as in the first embodiment illustrated in FIGS. 2 and 3 .
- the predetermined application order may be an arbitrary order.
- the predetermined application order may not necessarily be the same as the order of security.
- the configuration of the relay device is not limited to the above-described configurations (e.g., the configuration illustrated in FIG. 2 ), but various other configurations may be adopted.
- the communication interface 510 may be an interface for power line communication (PLC) instead of the interface compliant with the IEEE802.3.
- the communication interface 510 may be an interface for wireless communication instead of an interface for wired communication.
- the communication interface 510 may be divided into an interface for an outside network and an interface for an internal network.
- the permissible determination method list data (e.g., permissible determination method list data 310 in FIG. 2 ) may be stored in a volatile memory (e.g., DRAM).
- data used for controlling the relay device may be stored in the volatile memory.
- the configuration of the network systems is not limited to the configurations according to the above respective embodiments, but various configurations may be adopted.
- the first authentication process section 802 a and the second authentication process section 802 b in the first embodiment illustrated in FIG. 1 may be realized by different server devices.
- Such a network configuration can be strong against failures (communication failure, device failure, and the like). Further, it may be configured such that a plurality of networks are connected to a relay device.
- some of the components that are realized by hardware may be realized by software.
- all or some of the components that are realized by software may be realized by hardware.
- the function of the permissible connection determination section 220 in the first embodiment illustrated in FIG. 2 may be realized by a dedicated hardware circuit.
- the software may be provided by means of computer readable storage media, either transitory or nontransitory.
- the computer readable nontransitory storage medium includes not only portable storage media such as flexible disks and CD-ROMs, but also various internal storage units in computers such as RAMs and ROMs, and external storage units fitted to computers such as hard disks.
- the computer readable transitory medium includes, for example, a propagation signal having computer executable code embodied therein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (9)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010077007A JP4977229B2 (en) | 2010-03-30 | 2010-03-30 | Apparatus, method, and program for relaying communication |
JP2010-077007 | 2010-03-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110243058A1 US20110243058A1 (en) | 2011-10-06 |
US8582476B2 true US8582476B2 (en) | 2013-11-12 |
Family
ID=44697976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/071,503 Active 2031-10-05 US8582476B2 (en) | 2010-03-30 | 2011-03-25 | Communication relay device and communication relay method |
Country Status (3)
Country | Link |
---|---|
US (1) | US8582476B2 (en) |
JP (1) | JP4977229B2 (en) |
CN (1) | CN102209359B (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5732745B2 (en) * | 2010-05-13 | 2015-06-10 | 富士通株式会社 | Network device, authentication method determining method, and authentication method determining program |
JP5828090B2 (en) * | 2011-04-20 | 2015-12-02 | パナソニックIpマネジメント株式会社 | Relay device |
US20130003875A1 (en) * | 2011-06-30 | 2013-01-03 | Broadcom Corporation | Powerline communication device with multiple plc interface(s) |
US8495714B2 (en) * | 2011-07-20 | 2013-07-23 | Bridgewater Systems Corp. | Systems and methods for authenticating users accessing unsecured wifi access points |
US9504089B2 (en) * | 2012-05-14 | 2016-11-22 | Broadcom Corporation | System and method for wireless station bridging |
JP5962261B2 (en) * | 2012-07-02 | 2016-08-03 | 富士ゼロックス株式会社 | Relay device |
US9203838B2 (en) * | 2012-10-31 | 2015-12-01 | Google Inc. | Providing network access to a device associated with a user account |
US9634726B2 (en) | 2012-11-02 | 2017-04-25 | Google Inc. | Seamless tethering setup between phone and laptop using peer-to-peer mechanisms |
US9936437B2 (en) * | 2013-08-12 | 2018-04-03 | Kt Corporation | Method and device for transmitting data in WLAN system |
CN104883682A (en) * | 2014-02-27 | 2015-09-02 | 中兴通讯股份有限公司 | WIFI hotspot connecting and selecting method, communication terminal and system |
RU2568282C2 (en) * | 2014-04-18 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for ensuring fault tolerance of antivirus protection realised in virtual environment |
US9980304B2 (en) | 2015-04-03 | 2018-05-22 | Google Llc | Adaptive on-demand tethering |
CN107040922B (en) * | 2016-05-05 | 2019-11-26 | 腾讯科技(深圳)有限公司 | Wireless network connecting method, apparatus and system |
JP7699958B2 (en) * | 2021-05-26 | 2025-06-30 | キヤノン株式会社 | COMMUNICATION DEVICE, CONTROL METHOD FOR COMMUNICATION DEVICE, AND PROGRAM |
KR20240008334A (en) * | 2021-06-09 | 2024-01-18 | 캐논 가부시끼가이샤 | Communication devices, communication methods and programs |
JP2023014832A (en) * | 2021-07-19 | 2023-01-31 | キヤノン株式会社 | Communication device, control method, and program |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020186688A1 (en) * | 1997-09-05 | 2002-12-12 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme incorporating individual user authentication |
US20030097593A1 (en) * | 2001-11-19 | 2003-05-22 | Fujitsu Limited | User terminal authentication program |
JP2006221605A (en) | 2005-01-14 | 2006-08-24 | Yamaha Corp | File access control system |
US20070190973A1 (en) * | 2005-05-23 | 2007-08-16 | Kabushiki Kaisha Toshiba | Base station, wireless communication systems, base station control programs and base station control methods |
US20080167003A1 (en) * | 2006-12-27 | 2008-07-10 | Interdigital Technology Corporation | Method and apparatus for base station self-configuration |
WO2009011055A1 (en) | 2007-07-19 | 2009-01-22 | Panasonic Corporation | Wireless terminal device, wireless connection method, and program |
JP4218934B2 (en) | 2002-08-09 | 2009-02-04 | キヤノン株式会社 | Network construction method, wireless communication system, and access point device |
JP2009164971A (en) | 2008-01-08 | 2009-07-23 | Canon Inc | Communication apparatus and control method |
US20100082999A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4594969B2 (en) * | 2007-08-28 | 2010-12-08 | 株式会社バッファロー | Wireless LAN access point, program and recording medium |
-
2010
- 2010-03-30 JP JP2010077007A patent/JP4977229B2/en active Active
-
2011
- 2011-03-25 US US13/071,503 patent/US8582476B2/en active Active
- 2011-03-28 CN CN201110078820.9A patent/CN102209359B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020186688A1 (en) * | 1997-09-05 | 2002-12-12 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme incorporating individual user authentication |
US20030097593A1 (en) * | 2001-11-19 | 2003-05-22 | Fujitsu Limited | User terminal authentication program |
JP4218934B2 (en) | 2002-08-09 | 2009-02-04 | キヤノン株式会社 | Network construction method, wireless communication system, and access point device |
JP2006221605A (en) | 2005-01-14 | 2006-08-24 | Yamaha Corp | File access control system |
US20070190973A1 (en) * | 2005-05-23 | 2007-08-16 | Kabushiki Kaisha Toshiba | Base station, wireless communication systems, base station control programs and base station control methods |
US20080167003A1 (en) * | 2006-12-27 | 2008-07-10 | Interdigital Technology Corporation | Method and apparatus for base station self-configuration |
WO2009011055A1 (en) | 2007-07-19 | 2009-01-22 | Panasonic Corporation | Wireless terminal device, wireless connection method, and program |
JP2009164971A (en) | 2008-01-08 | 2009-07-23 | Canon Inc | Communication apparatus and control method |
US20100082999A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
Also Published As
Publication number | Publication date |
---|---|
CN102209359A (en) | 2011-10-05 |
CN102209359B (en) | 2014-12-24 |
US20110243058A1 (en) | 2011-10-06 |
JP4977229B2 (en) | 2012-07-18 |
JP2011211471A (en) | 2011-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8582476B2 (en) | Communication relay device and communication relay method | |
US11064353B2 (en) | Infrastructure coordinated media access control address assignment | |
US8150372B2 (en) | Method and system for distributing data within a group of mobile units | |
CN1929398B (en) | Security setting method in wireless communication network, storage medium, network system and client device | |
EP1935143B1 (en) | Virtual lan override in a multiple bssid mode of operation | |
US8599756B2 (en) | Communication relay device, communication relay method, and storage medium having communication relay program stored therein | |
US9071968B2 (en) | Method, apparatus, and system for centralized 802.1X authentication in wireless local area network | |
US20050266826A1 (en) | Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment | |
KR100694219B1 (en) | Apparatus and method for detecting access point data transmission mode in wireless terminal | |
US20100119069A1 (en) | Network relay device, communication terminal, and encrypted communication method | |
NO338392B1 (en) | Basic Wi-Fi architecture for 802.11 networks | |
TW201733377A (en) | Wireless WAN wireless area network aggregation preservation | |
US20130283050A1 (en) | Wireless client authentication and assignment | |
JP2005204086A (en) | Mobile radio communication system, mobile radio terminal device, virtual private network relay device, and connection authentication server | |
US20120054359A1 (en) | Network Relay Device and Frame Relaying Control Method | |
JP2014509468A (en) | Method and system for out-of-band delivery of wireless network credentials | |
US20250016147A1 (en) | Onboarding client device to user-defined network using federation-based network identity | |
CN101247295A (en) | A method and device for obtaining access controller information in a wireless local area network | |
JP2008206102A (en) | Mobile communication system using mesh-type wireless lan | |
JP2020505845A (en) | Method and device for parameter exchange during emergency access | |
KR20130033691A (en) | Terminal and apparatus authentication surpporting for network access security enhancement system | |
KR102558364B1 (en) | Method for 5g lan service | |
US20250133395A1 (en) | Supporting multiple pre-shared keys in wi-fi networks | |
KR101504717B1 (en) | System and method for terminal authentication processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BUFFALO INC., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAMADA, DAISUKE, MR.;REEL/FRAME:026019/0265 Effective date: 20110314 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: MELCO HOLDINGS INC., JAPAN Free format text: MERGER;ASSIGNOR:BUFFALO INC.;REEL/FRAME:072191/0806 Effective date: 20250401 |